{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T15:05:03Z","timestamp":1770995103762,"version":"3.50.1"},"reference-count":8,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2016,4,2]]},"DOI":"10.1080\/0144929x.2015.1128975","type":"journal-article","created":{"date-parts":[[2016,2,15]],"date-time":"2016-02-15T14:45:48Z","timestamp":1455547548000},"page":"298-303","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":14,"title":["An approach for preventing the indexing of hijacked journal articles in          scientific databases"],"prefix":"10.1080","volume":"35","author":[{"given":"Mehdi","family":"Dadkhah","sequence":"first","affiliation":[{"name":"Department of Computer and Information Technology, Foulad Institute of Technology","place":["Fooladshahr, Iran"]}]},{"given":"Tomasz","family":"Maliszewski","sequence":"additional","affiliation":[{"name":"Department of Social Sciences, Pomeranian University in S\u0142upsk","place":["S\u0142upsk, Poland"]}]},{"given":"Vyacheslav V.","family":"Lyashenko","sequence":"additional","affiliation":[{"name":"Faculty of Applied Mathematics and Management, Department of Informatics, Kharkov National University of RadioElectronics","place":["Kharkov, Ukraine"]}]}],"member":"301","published-online":{"date-parts":[[2016,2,15]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1038\/489179a"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1087\/20130203"},{"key":"e_1_3_2_4_1","unstructured":"Beall J. 2015. \u201cHijacked Journals.\u201d http:\/\/scholarlyoa.com\/other-pages\/hijacked-journals\/."},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.h210"},{"key":"e_1_3_2_6_1","unstructured":"DOAJ (Directory of Open Access Journals). Accessed July 29 2015. https:\/\/doaj.org\/."},{"key":"e_1_3_2_7_1","unstructured":"Jalalian M. 2015a. \u201cHijacked Journals.\u201d http:\/\/www.mehrdadjalalian.com\/index.php\/list-of-hijacked-journals-and-fake-publishers\/30-hiajcked-journal-list-2014-first-edition-june-2014."},{"issue":"2","key":"e_1_3_2_8_1","first-page":"1069","article-title":"The Story of Fake Impact Factor Companies and\n            How We Detected Them","volume":"7","author":"Jalalian M.","year":"2015","unstructured":"Jalalian, M. 2015b. \u201cThe Story of Fake Impact Factor Companies and How We Detected Them.\u201d Electronic Physician 7 (2): 1069\u20131072.","journal-title":"Electronic Physician"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkt441"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2015.1128975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T09:35:32Z","timestamp":1762248932000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2015.1128975"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,15]]},"references-count":8,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,4,2]]}},"alternative-id":["10.1080\/0144929X.2015.1128975"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2015.1128975","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,15]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2015-08-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-11-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-02-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}